Дисертації з теми "Database security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Database security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Sakhi, Imal. "Database security in the cloud." Thesis, KTH, Data- och elektroteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102955.
Повний текст джерелаChung, Sun S. "Anti-Tamper Databases: Querying Encrypted Databases." online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.
Повний текст джерелаWong, Wai-kit, and 王偉傑. "Security and computability in database applications." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B4607787X.
Повний текст джерелаKong, Yibing. "Security and privacy model for association databases." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.
Повний текст джерелаHoeppner, Joseph A. "A Comparison of Cloud Computing Database Security Algorithms." UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/596.
Повний текст джерелаChen, Yu. "Protection of database security via collaborative inference detection." Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1472132501&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Повний текст джерелаBernagozzi, Stefano. "Range Queries on an encrypted outsourced database." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10907/.
Повний текст джерелаPokorný, Tomáš. "Bezpečnostní aspekty implementace databázových systémů." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-17064.
Повний текст джерелаHo, Sze-lok, and 何思樂. "Technical solutions for conducting investigations in digital age." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.
Повний текст джерелаpublished_or_final_version
Computer Science
Master
Master of Philosophy
Zhang, Ye, and 张叶. "Query and access control over encrypted databases." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.
Повний текст джерелаPradhan, Sayli H. "User Interface Design, Database Connectivity, and Security in Fortified Cards." Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10638557.
Повний текст джерелаThe current debit and credit cards have inherent security flaws. The solution to this problem is the use of Fortified Cards, which differ from the credit or debit cards due to the embedded Quick Response (QR) code. With a combination of a user?s International Mobile Equipment Identity (IMEI) number and the QR code on the Fortified Card, any transaction can be performed in a more secure way, thereby reducing security frauds. In this report, three modules are explained, namely: User Interface (UI) design, database (backend) connectivity, and security. System Vision is used to explain the entire process of the transaction. The Android application uses the backend database in order to access and verify a user?s bank details. A few encryption algorithms were studied and Advanced Encryption Standard (AES) was chosen for implementation. The application was successful in transferring the transaction amount from the customer?s account to the vendor?s account.
Porter, Paul A. "Trust Negotiation for Open Database Access Control." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1311.pdf.
Повний текст джерелаNeophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.
Повний текст джерелаDepartment of Computer Science
Zhang, Xiao Meng M. Eng Massachusetts Institute of Technology. "Designing a SQL query rewriter to enforce database Row Level Security." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106398.
Повний текст джерелаThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 73-74).
This thesis presents the design and implementation of Row Level Security, a fine-grained access control mechanism built on top of a database-agnostic data sharing platform called DataHub. Existing access control mechanisms for database systems are typically coarse-grained, in the sense that users are either given access to an entire database table or nothing at all. This is problematic with the rise in popularity of data sharing, where users want to share subsets of data in a table with others, rather than the entire table. Row Level Security addresses this problem by allowing users to create security policies that define subsets of data others are able to access, and enforces security policies through a query rewrite mechanism. This work presents Row Level Security, as well as an evaluation of its performance overhead costs and ease of use.
by Xiao Meng Zhang.
M. Eng.
Hong, Seng-Phil. "Data base security through simulation." Virtual Press, 1994. http://liblink.bsu.edu/uhtbin/catkey/902465.
Повний текст джерелаDepartment of Computer Science
Ofori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Повний текст джерелаCui, Yingjie. "A study on privacy-preserving clustering." Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B4357225X.
Повний текст джерелаPavlou, Kyriacos Eleftheriou. "Database Forensics in the Service of Information Accountability." Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/265817.
Повний текст джерелаAiello, Brady Benjamin. "Analyzing Global Cyber Attack Correlates Through an Open Database." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1898.
Повний текст джерелаGaadingwe, Tshepo Gaadingwe. "A critical review of the IFIP TC11 Security Conference Series." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/507.
Повний текст джерелаBai, Yun. "On formal specification of authorization policies and their transformations : thesis /." View thesis View thesis, 2000. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030612.090157/index.html.
Повний текст джерела"A thesis submitted for the degree of Doctor of Philosophy at University of Western Sydney - Nepean." "September 2000." Bibliography : leaves 141-150.
Nguyen, Anthony. "Database system architecture for fault tolerance and disaster recovery." [Denver, Colo.] : Regis University, 2009. http://adr.coalliance.org/codr/fez/view/codr:152.
Повний текст джерелаTao, Jia. "A model for storage and query of cascading beliefs in multilevel security database." [Ames, Iowa : Iowa State University], 2006.
Знайти повний текст джерелаBruner, William W. "National Security Implications of Inexpensive Space Access." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/brunerww.htm.
Повний текст джерелаRaybourn, Tracey. "Bucketization Techniques for Encrypted Databases: Quantifying the Impact of Query Distributions." Bowling Green State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1363638271.
Повний текст джерелаHuber, Matthias Christoph [Verfasser], and J. [Akademischer Betreuer] Müller-Quade. "Provable and Practical Security for Database Outsourcing / Matthias Christoph Huber. Betreuer: J. Müller-Quade." Karlsruhe : KIT-Bibliothek, 2016. http://d-nb.info/1113109289/34.
Повний текст джерелаReinsmith, Lee, and Steven Surber. "A PC Database and GUI for Telemetry Data Reduction." International Foundation for Telemetering, 1999. http://hdl.handle.net/10150/608316.
Повний текст джерелаThe Telemetry Definition and Processing (TDAP II) application is a PC-based software tool that meets the varied needs - both now and into the 21st century - of instrumentation engineers, data analysts, test engineers, and project personnel in the Test and Evaluation (T&E) community. TDAP II uses state-of-the-art commercial software technology that includes a Microsoft Access 97Ô database and a Microsoft Visual BasicÔ Graphical User Interface (GUI) for users to view and navigate the database. Developed by the Test and Analysis Division of the 96th Communications Group for the tenants of the Air Armament Center (AAC), Eglin AFB Florida, TDAP II provides a centralized repository for both aircraft and weapons instrumentation descriptions and telemetry EU conversion calibrations. Operating in a client/server environment, TDAP II can be effectively used on a small or large network as well as on both a classified or unclassified Intranet or Internet. This paper describes the components and design of this application, along with its operational flexibility and varied uses resulting from the chosen commercial software technology.
Perry, Sonja Michele. "An integrated intranet and dynamic database application for the Security Manager at Naval Postgraduate School." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FPerry.pdf.
Повний текст джерелаThesis advisor(s): Randy L. Borchardt, Dan C. Boger. Includes bibliographical references (p. 67). Also available online.
Shah, Rahul Arvind. "Vulnerability assessment of Java bytecode." Auburn, Ala., 2005. http://repo.lib.auburn.edu/Send%2012-16-07/SHAH_RAHUL_44.pdf.
Повний текст джерелаCui, Yingjie, and 崔英杰. "A study on privacy-preserving clustering." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B4357225X.
Повний текст джерелаDaehnick, Christian C. "Blueprints For The Future Comparing National Security Space Architectures /." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/daehnicc.htm.
Повний текст джерелаWang, Shujing. "Logic programming based formal representations for authorization and security protocols." Thesis, View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.
Повний текст джерелаKumka, David Harold. "Quantifying Performance Costs of Database Fine-Grained Access Control." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/204.
Повний текст джерелаPoe, Gary A. "Privacy in Database Designs: A Role Based Approach." Scholar Commons, 2007. https://scholarcommons.usf.edu/etd/454.
Повний текст джерелаMiller, William B. "Classifying and Cataloging Cyber-Security Incidents Within Cyber-Physical Systems." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/4345.
Повний текст джерелаWang, Shujing. "Logic programming based formal representations for authorization and security protocols." View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.
Повний текст джерелаA thesis submitted for the degree of Doctor of Philosophy to the University of Western Sydney, College of Health and Science, School of Computing and Mathematics. Includes bibliography.
Maphakela, Madidimalo Rabbie. "A model for legal compliance in the South African banking sector : an information security perspective." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/725.
Повний текст джерелаLukanič, Michal. "Bezpečnost v databázi Oracle." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-72438.
Повний текст джерелаChmel, Marek. "Informační systém pro školící centrum." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2009. http://www.nusl.cz/ntk/nusl-222276.
Повний текст джерелаBai, Yun. "On formal specification of authorization policies and their transformations : thesis." Thesis, View thesis View thesis, 2000. http://handle.uws.edu.au:8081/1959.7/564.
Повний текст джерелаHermansson, Tobias. "FiLDB : An Architecture for Securely Connecting Databases to the Internet." Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-625.
Повний текст джерелаToday more and more Information systems exist and they contain more and more information. Many information systems contain information about people that is secret or sensitive. Such information should not be allowed to leak from a database. This problem grows more and more as databases are made available via the Internet.
There have been a number of publicised occasions where hackers have passed security barriers and got information that is not intended to be publicly available. There have also been cases where the administrators of systems have made mistakes, so that classified information was published on the Internet.
The FiLDB architecture uses existing technology together with new components to provide an environment in which databases can be connected to the Internet without losing security. Two databases, with physical separation between them, are used as a security measure. Secret information is stored only in an internal database, which is separated from the Internet. An external database contains information which is to be used from the Internet, and hence sensitive information is not stored in this database.
Motara, Yusuf Moosa. "File integrity checking." Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1007701.
Повний текст джерелаKalakota, Govardhan Reddy. "Hierarchical Partition Based Design Approach for Security of CAN Bus Based Automobile Embedded System." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535382487070314.
Повний текст джерелаNaujokas, Tomas. "Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_103132-65944.
Повний текст джерелаThis work destination was to create requirements based on data security and availability method choosing and their combination methodology. Introduce requirements based on complex security model. Eliminate information lack of complex security. In work analyzed and compared complex security solutions of famous the word security specialists. Accomplished system vulnerability analysis and systematized information. During the work revealed most important vulnerabilities, explain how it works and how correctly secure of them. In this research described security model of complex security, which later detailed as smaller part of model. Complex security model were used at nowadays most popular combined information system. For research were used Microsoft Windows Server 2008 and Microsoft SQL Server 2008. Created methodology is useful then necessary to test existing or creating new configuration of system.
Kalibjian, J. R. "Telemetry Post-Processing in the Clouds: A Data Security Challenge." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595799.
Повний текст джерелаAs organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and tokenization are impacting cloud security, their effect on telemetry post-processing will also be examined. An architecture will be described detailing how these data security tools can be utilized to make telemetry post-processing environments in the cloud more robust.
Winner-Leoni, Melissa D. "An Investigation of the Security Designs of a Structured Query Language (SQL) Database and its Middleware Application and their Secure Implementation within Thinclient Environments." [Denver, Colo.] : Regis University, 2008. http://165.236.235.140/lib/MWinnerLeoni2008.pdf.
Повний текст джерелаKalibjian, Jeff. "Data Security Architecture Considerations for Telemetry Post Processing Environments." International Foundation for Telemetering, 2017. http://hdl.handle.net/10150/626950.
Повний текст джерелаSubekti, Mohammad, and Widhya Bagya Prawiraatmadja. "A prototype database management system for the Budgeting System of the Department of Defense and security of the Republic of Indonesia." Thesis, Monterey, California. Naval Postgraduate School, 1985. http://hdl.handle.net/10945/21512.
Повний текст джерелаBrzobohatá, Veronika. "Vytvoření help desku SW nástroje pro řízení kybernetické bezpečnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444576.
Повний текст джерелаMiklau, Gerome. "Confidentiality and integrity in distributed data exchange /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7011.
Повний текст джерела